Gulf War Air Power Survey


The Dhahran area was one of two priorities for air base ground support



Download 5.55 Mb.
Page35/61
Date26.11.2017
Size5.55 Mb.
#35436
1   ...   31   32   33   34   35   36   37   38   ...   61

The Dhahran area was one of two priorities for air base ground support.

Photo above shows open storage at Dhahran.

In this process, the commanders' assessments of risk was a critical factor. The command relationship provided unity of command as well as the impetus for determining a deliberate and decisive response to any impending threat. Rear battle officers, acting for Maj. Gen. William G. Pagonis, U.S. Army, 22d Support Command, the rear area commander, consulted with air base commanders and other cluster commanders to determine which procedures provided the greatest overall security to the rear area based on the threat and forces available. However, this was not formally established until early January 1991.
Operation Desert Shield air base survivability assessments pre­pared by the Office of Special Investigations (OSI) at each location were used to assist in formulating decisions on security force structure and design. In concert with continuous analysis of threat level and the devel­opment of passive security measures at each location, including communi­cation, operations, and tactical deception, measures were integrated to reduce the probability of attacks and to minimize their effects if they did occur. These elements included counter-surveillance operations, recon­naissance patrols, and concentration of available resources at fixed posi­tions and at critical points along main supply routes, alternate transporta­tion routes, and lines of communication. They also included appropriate­ly interfacing passive security measures, including counter-surveillance teams, recon­naissance patrols, and, in some locations, sensor-enhanced security with­out additional expenditure of manpower. Host nation forces provided security for key terrain surrounding critical facilities or bases. For exam­ple, at Dubai Air Base, United Arab Emirates, the Dubai civilian police heavily patrolled the outside perimeter and reported any suspicious activi­ty to U.S. security forces. Also, camel and goat herders that worked in the area around the base possessed cellular telephones and assisted with lookout and surveillance. Any suspicious activities were called into the Minhad local civilian police.844
While host nation security forces exerted rigorous circulation control over the indigenous population, Air Force security police provided circula­tion control within defended localities. As an added measure of flexibility, CENTAF security police staff developed a quick-reaction force of forty-four men, billeted at Riyadh Air Base, with the capability of being airlifted to any base. For example, this team moved forward to reinforce King Fahd Air Base when security police units responded to aircraft crashes that occurred during the intensive training leading up to the war. Safeguarding classified information demanded particular atten­tion.845
Command and Control
While Coalition Coordination Communications and Intelligence Center (C3IC) was not a command echelon, it was used primarily to “harmonize” operational planning in areas such as host nation support and movement control. It became the “combined operations cornerstone,” especially for rear area security operations conducted by other host nation and Coalition forces in the Communications Zone (COMMZ), and for the coordination and execution of defense security operations. Overall plan­ning and coor­dina­tion was the responsibility of liaison officers of the

Figure 3

Air Base Ground Defense


participating forces.846 Once the rear area became formally established, security police units within the zone reported through one of three Rear Tactical Opera­tions Centers. Those outside the zone, reported directly to the CENTAF security police operations cell at Riyadh.847
Early during Operation Desert Shield when security-alerting system networks were strained to the limit, it became crucial that the joint com­munications electronic operating instructions (JCEOIs) used to coordi­nate U.S. Army support be addressed at CENTAF as well. After several meet­ings between CENTCOM and ARCENT, the Air Force obtained authori­zation to receive the same instructions. The U.S. Army military police accepted the CENTAF security police proposal for a classified joint emer­gency frequency that would be used by all police forces, including Royal Saudi Air Force police, the Ministry of Defense police, and all other Coalition military and civil police agencies. The frequencies were to be used only for emergency operationsand they were incorporated into the joint electronic operating instructions.
Close Air Support for Rear Area Security
Close Air Support for rear area security was both preplanned and available to meet more immediate requests.848 For example, the 130th Rear Tactical Operations Center was assigned to the commander of the 22d Support Command to plan and coordinate rear area security opera­tions in the Communication Zone.849 Coordination between directorates of General Security, Traffic Internal Security and Civil Defense, played a crucial role, especially outside the zone, as host nation forces were responsible for external air base ground defense, port security, and harbor defense for bases and ports outside the combat zone, but within the theater. Com­mand and control systems identified for rear area security operations had to be compatible with those of the tactical combat force (maneuver ele­ment) and systems used by CENTAF air base ground defense units. Liaison teams reported significant rear area activities through the C3IC.
Air Base Defense
The development of security schemes at the beddown sites did have its problems, which were mostly resolved, however, after the first few weeks when personal relationships and cultural differences were worked out and procedures established. For example, at Shaikh Isa Air Base, Bahrain, CENTAF and MARCENT aircraft shared the runway, along which the Air Force wanted to disperse its aircraft, the Marines wanted to group theirs in order to facilitate air operations coordination. Grouping caused concern for Air Force security officials because it presented lucrative targets and exposed a potential for multiple explosions should one or more aircraft be sabotaged. The CENTAF security police staff at Riyadh found it necessary to send a field grade officer to resolve the differences, and the result was an agreement that the Marines would provide external security, the Air Force internal.850 Therefore aircraft parking issues were resolved using the Air Force parking scheme to enhance security of the aircraft. This was accomplished because RED HORSE engineers construct­ed additional parking pads and provided addi­tional security barriers.
Defending allied personnel and assets in Riyadh presented a more complicated problem. CENTCOM assumed responsibility for protecting British and French elements, as well as its own, with the British and French providing a platoon of security forces to assist. If the security situation in Riyadh deteriorated, CENTCOM planned to use elements of the 82d Airborne to protect the area, in which case it would be designated as the Tactical Combat Force. As long as the situation was not serious, each allied or component command basically provided security for the office buildings and quarters for its personnel. Thus, in the 130th RADC area and the Riyadh community CENTAF staff duties were limited to defense of Riyadh Air Base, the Royal Saudi Air Force Headquarters, and Eskan

Village.851 To implement this plan, each allied or component command sent representatives to several coordinating committees. They functioned as elements of the Coalition Coordination Communication Integration Center, which operated on a twenty-four hour basis. In this man­ner, problems could be presented immediately and resolved quick­ly.852
Each unit assigned to CENTAF developed security operations plans that outlined cooperation among CENTAF, allied, and host nation security forces. The final scheme was a “three tier defense system.” The outer tier consisted of plain-clothes detectives augmented by a second tier of civil police. The third tier was the internal security provided by Saudi and U.S. Air Force security forces.853 Individual host nation sensitivities were key factors in determining the degree of interaction between Air Force and host nation security forces in the employment of air base ground defense techniques. [DELETED]854,855,856

In some cases, as in the United Arab Emirates, CENTAF security police formed armed patrols off-base. General­ly, such less stringent rules regarding employment of U.S. security police forces were in force in nations farther away from the Iraqi-Kuwaiti bor­ders, where there was less danger of direct enemy air or ground attack and less complicated fire support coordination requirements. In such cases, terrorists posed the biggest perceived threat in the form of sabotage or other small-scale strikes. Those bases closer to the perceived battle area were protected by Army forces, even though those units were not necessarily located im­mediately adjacent to or within the base itself.857
Base security at Dhahran (specifically King Abdul Aziz Air Base) included Saudi Royal Air Force troops, U.S. Army air defense artillery units, and an initial contingent of about 209 Air Force security police from the 1st Combat Support Element out of Langley AFB, Virgin­ia. Navy security forces provided port security. Due to changes in the perceived threat, CENTAF increased its securi­ty force strength at Dhahran to 409 prior to the open­ing of hostili­ties.858 Once again, Air Force securi­ty police pro­vided weapon systems security, assist­ed by a 90-man Saudi Royal Air Force contingent. The Saudi Royal Air Force security forces protected the perimeter, and the U.S. Army 11th Air Defense Artillery Battery manned a combination of Patriot and Stinger missiles.859 CENTAF Security advised aircrews to take off and land in pat­terns that avoided dense and populated areas that were within the range of hand-held SA-7 and SA-14 shoul­der fired infra­red surface-to-air mis­siles. These areas were rigorous­ly pa­trolled by Air Force and host nation secu­rity forces.860

Table 4

Integrated Security Forces of U.S. Air Bases




Air Base


U.S. Air Force

Other U.S. Service

Host Na­tion Mili­tary

Other Coalition Partner

Host

Nation Civilian

Abu Dhabi, UAE

X




X

X




Al Ain, UAE

X




X




X

Al Dhafra, UAE

X




X




X

Al Jouf, SA

X

X

X

X




Al Kharj, SA

X

X

X




X

Al Minhad, UAE

X




X







Bateen, UAE

X




X







Cairo, Egypt

X




X







Dhahran, SA

X

X

X

X

X

Doha, Qatar

X




X

X




Dubai, UAE

X




X




X

Jeddah, SA

X




X




X

Khamis Mushait,

X




X







King Fahd, SA

X

X

X




X

KKIA, SA

X




X







KKMC, SA

X

X




X

X

Masirah, Oman

X




X







Riyadh, SA

X




X

X




Seeb, Oman

X




X







Shaikh Isa,

X

X

X







Sharjah, UAE

X




X







Tabuk, SA

X




X

X




Taif, SA

X




X




X

Thumrait, Oman

X




X




X

59


Base secu­ri­ty at Dhahran included a combination of Patri­ot and Stinger mis­siles. Patriot is shown at left.

7

Initially, at some locations, such as Thumrait, Oman, the host nation did not allow arm­ing any foreign military person. There­fore, it became the responsibil­ity of Coalition partners to use their own security forces for external air base ground defense at sites where allied units were located.861 In these areas, security police forces initially func­tioned as liaison and an adjunct securi­ty report­ing, alerting, and response force, much as security support forces (func­tional area owner/user, main­tenance, and combat service support forces) supplement security at all U.S. Air Force bases. And in some cases, U.S. security forces were restricted to operations with concealed weapons. These initial problems, however, were eventually resolved. U.S. security forces were armed and security police command­ers given authority to expend war readiness material munitions for confi­dence and familiariza­tion training and to train with Coalition forces.862

60


Coalition partners use their own security forces for external air base ground defense.

8



The base bed­down compli­cat­ed security plan­ning for several rea­sons. The pro­tection of high value assets re­mained a concern through­out the war. For example, the E-3 AWACS aircraft were all initial­ly locat­ed at Riyadh but were eventu­ally dispersed to three dif­ferent loca­tions, primari­ly for security con­sider­ations.863 In addi­tion, security forces at many bases were also strapped with man­pow­er-intensive weapon/logistics con­voy and escort duties, since canton­ment complex­es were dis­persed as far as five to fifteen miles apart. As a result, air bases in the theater preclud­ed any at­tempt to secure them in a “tradi­tional” air base defense concept. Units developed air base ground defense concepts, devised security schemes, and secured key resourc­es (dispersed aircraft park­ing areas, POL areas, muni­tions storage areas and billeting areas, etc.). Reli­ance on mobile response was wide­spread be­cause of the distance between loca­tions requir­ing protec­tion. Further­more, exer­cises and evalua­tions of security require­ments had demonstrat­ed that the density of detec­tion mech­anisms and the location of response forces were key to success­ful air base ground de­fense efforts.
As stated above, rapid re­sponse was crucial to the rear area securi­ty system. Therefore, vehicles and communications quickly emerged as the primary problems for Air Force securityissues also of a major con­cern during previous conflicts. Securi­ty police vehicles did not re­ceive prior­ity for early airlift dur­ing de­ploy­ment.864 Because these spe­cial­ized ar­mor­ed vehi­cles were re­quired to support responses over aus­tere ter­rain and to serve as weap­ons platforms for heavy and crew-served weap­ons, they were con­sid­ered cru­cial to the successful defense of air bases.
In this constantly changing environment, rear area security mis­sions sometimes were redistributed, as U.S. Army units flowed in and out of various locations.865 When U.S. Army forces shifted posi­tions, espe­cially from places like Dhahran and King Fahd, the Air Force security police relied more heavily on sensor technology to provide force multipli­ers.866
The Terrorist Threat
Gen H. Norman Schwarzkopf and Lt. Gen. Charles A. Horner con­sid­ered terror­ism as a top priority, and anti-terrorism initiatives essen­tial.867 After the initial Coali­tion buildup, intelligence assessments indicat­ed that the feasibility of an inva­sion of Saudi Arabia had dropped from the most likely to the least likely Iraqi option. During the Christmas holiday period, respec­tive staffs were informed that General Schwarzkopf had be­come increasingly concerned with the possibility of a preemptive or surprise attack by Iraq. Such an attack might well be expected during the Christmas or New Year's holi­days, or prior to the deadline imposed by the United Nations for Iraq to get out of Kuwait.
General Horner met with General Schwarzkopf to obtain approval of the CENTAF-recommended security plan for coping with this potential threat. CENTAF security police had developed the plan and disseminated it to all Air Force units. Instructions in it [DELETED] included physical securi­ty and anti-terrorist checklists to be used by all units and submitted as addendum to situation reports to CENTAF Secu­rity Police. The status of “open items” which represented potential areas of vulnerability were reviewed on a daily basis.
The final preparations for Operation Desert Storm were masked by placing many aircraft on ground alert that would permit mission planning, crew rest, and aircraft reconfiguration without revealing Coali­tion plans. Obviously, this put increased burdens on the security forces. The internal dispersal of aircraft increased the posting requirements for both Air Force and host nation security police forces. Emphasis was placed on security status reporting to step up the intensity of rear area security and air base ground defense network during this period of vul­nerability. Another period of vulnerability took place when U.S. Army units were shifted to the left flank in preparation for the ground offen­sive. During this period, military police units protected lines of commu­nica­tion, and only a squad-size force remained in Dhahran area.868
During this period, CENTAF security police continued to receive sporadic and isolated reports of threats. Most of these reports were terrorist-related, but some indicated potential small arms sniper fire adja­cent to installations.869 For example, on 3 February 1991, a civilian contract bus carrying three U.S. military, a Saudi military guard, and civilian driver from the Al Khalid hotel to the Jeddah Air Base and was fired upon. The incident occurred approximately three miles from base, in the city of Jeddah, on a major six-lane highway. The terrorists fired ten to fifteen 9-mm shots, all hitting the passenger side of the bus, spaced from front to rear, inflicting minor injuries on two U.S. military person­nel. The Saudis apprehended four Palestinians and two Yemenis as a result of the incident. As the concerns that more attacks would follow, the impor­tance of accurate intelligence became more pronounced, and multisource intelligence became a cornerstone of the rear area secu­rity and air base ground defense system. Each Service remained respon­sible

for its own counterintelligence network, with intensive liaison to ensure a coordinated effort.870

61


Download 5.55 Mb.

Share with your friends:
1   ...   31   32   33   34   35   36   37   38   ...   61




The database is protected by copyright ©ininet.org 2024
send message

    Main page